Senior Incident Response Analyst, Arlington, VA, US

Arlington, VA, US Leidos

LEARN MORE / APPLY

Arlington VA US 22201

Description

At Leidos, we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customers’ success. We empower our teams, contribute to our communities, and operate sustainable. Everything we do is built on a commitment to do the right thing for our customers, our people, and our community. Our Mission, Vision, and Values guide the way we do business.

If this sounds like the kind of environment where you can thrive, keep reading!

The Digital Modernization Sector brings together our digital transformation and IT programs, allowing us to better serve our customers through scale and repeatability. Leidos has a critical need for a Senior Incident Response Analyst to support the DHS CISA Program.

The Department of Homeland Security (DHS), Security Operations Center (SOC) Support Services is a US Government program responsible to monitor, detect, analyze, mitigate, and respond to cyber threats and adversarial activity on the DHS Enterprise.  The DHS SOC has primary responsibility for monitoring and responding to security events and incidents detected at the Trusted Internet Connection (TIC) and Policy Enforcement Point (PEP) and is responsible for directing and coordinating detection and response activities performed by each Component SOC. Direction and coordination are achieved through a new shared DHS incident tracking system and other means of coordination and communication. Leidos is seeking a Senior Incident Response Analyst to join our team on this highly visible DHS CISA SOC Program.

The Incident Responder will perform the following:

• Coordinate investigation and response efforts throughout the Incident Response lifecycle

• Correlate and and analyze events and data to determine scope of Cyber Incidents

• Acquire and analyze endpoint and network artifacts, volatile memory, malicious files/binaries and scripts

• Recognize attacker tactics, techniques, and procedures as potential indicators of compromise (IOCs) that can be used to improve monitoring, analysis and Incident Response.

• Develop, document, and maintain Incident Response process, procedures, workflows, and playbooks

• Tune and maintain security tools (EDR, IDS, SIEM, etc) to reduce false positives and improve SOC detection capabilities

• Document Investigation and Incident Response actions taken in Case Management Systems and prepare formal Incident Reports

• Create metrics and determine Key Performance Indicators to drive maturity of SOC operations

• Develop security content such as scripts, signatures, and alerts

Basic Qualifications

Bachelors’ degree in Computer Science, Engineering, Information Technology, Cyber Security, or related field and 12-15 years of related experience.  Additional years of experience and/or cyber certifications may be considered in lieu of degree.

In-depth knowledge of each phase of the Incident Response life cycle

• Expertise of Operating Systems (Windows/Linux) operations and artifacts

• Expertise of Enterprise Network Architectures to include routing/switching, common protocols (DHCP, DNS, HTTP, etc), and devices (Firewalls, Proxies, Load Balancers, VPN, etc)

• Ability to recognize suspicious activity/events, common attacker TTPs, and perform logical analysis and research to determine root cause and scope of Incidents

• Expertise with Cyber Kill Chain and have utilized the ATT&CK Framework

• Have scripting experience with Python, PowerShell, and/or Bash

• Ability to independently prioritize and complete multiple tasks with little to no supervision

• Flexible and adaptable self-starter with strong relationship-building skills

• Strong problem-solving abilities with an analytic and qualitative eye for reasoning

• Strong verbal and written communication skills

•Ability to communicate with all levels of audiences (subordinates, peers & leadership)

* Candidate must have technical hands on experience in the areas of incident detection and response, malware analysis, or computer forensics.

All Department of Homeland Security SOC employees are required to favorably pass a 5-year (BI) Background Investigation.

Candidates will have at least one of the following certifications:

SANS GIAC: GCIH, GCIA, GCFA, GPEN GCFE, GREM

CISSP OSCP, OSCE, OSWP

Preferred Qualifications

Experience in cyber government, and/or federal law enforcement FISMA systems.

Original Posting Date:

2024-11-13

While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.

Pay Range:

Pay Range $126,100.00 – $227,950.00

The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

#Remote

Leidos / Equal Opportunity Employer

R-00148132 JBLDJ 2024-12-12 02:00:58 UTC

LEARN MORE / APPLY

Leidos

BillGoldenJobs.com Jobs Careers

Job Hiring / Arlington, VA, US / Senior Incident Response Analyst / Leidos >> APPLY/LEARN MORE >> https://careers.leidos.com/jobs/15201022-senior-incident-response-analyst?tm_job=R-00148132&tm_event=view&tm_company=2502&bid=351 >> #job #jobs #hiring #BGJobs   

+++++++++++++++
? Looking for more jobs like this? Find more at CareerOneStop, sponsored by the U.S. Department of Labor Employment and Training Administration.
+++++++++++++++

Arlington, VA, US

Share:

More Posts

BillGoldenJobs by IntelligenceCareers.com

Intel Analyst, Senior, SAN ANTONIO TX

TS/SCI … UIC Government Services and the Bowhead Family of Companies seeks Senior Intel Analyst / San Antonio TX … Provide AF NTI SME and have familiarity with Combat Support Agency (CSA) and Air Force ISR operations; joint and combined AOC processes; aerospace operations planning and associated documents such as Air Tasking Orders (ATO) and Special Instructions (SPINS); national intelligence collection platforms and processes; and others.

BillGoldenJobs by IntelligenceCareers.com

Targeting Analyst, Jr, CHARLOTTESVILLE VA

TS/SCI … Amentum seeks JR Targeting Analyst / CHARLOTTESVILLE, VA … Develops target packages and network analysis to identify targets and target systems for joint lethal and / or non-lethal engagements.

BillGoldenJobs by IntelligenceCareers.com

Biometrics & Identity Intelligence Analyst, Jr, CHARLOTTESVILLE VA

TS/SCI … Amentum seeks JR Biometrics & Identity Intelligence Analyst / CHARLOTTESVILLE VA … Experience with analytical tools and databases to include but not limited to BI2R/I2AR, Palantir, Query Tree, Chrome, Analyst Notebook, open source research, Biometric Automated Toolset (BAT), TIDE, Pulse, QLIX.

BillGoldenJobs by IntelligenceCareers.com

Activity Based Intelligence Analyst, Arlington VA

TS/SCI … Royce Geospatial Consultants seeks Activity Based Intelligence Analyst / Arlington VA … desired tools: VOLTRON/DX, Rockstar/Icon, iSPY/OMAR, Lucky/NGT/TAC/CHROME/HOT-R, METRICS/FADE-MIST/Thresher, TIDE/QLIX/Bi2R, Attack the Network Tool Suite (ANTS), MITRE /SKOPE ABI Tools.

Send Us A Message

Senior Incident Response Analyst, Arlington, VA, US

... Leidos / Arlington, VA, US JBLDJR-00148132
BillGoldenJobs.com

BillGoldenJobs is an IntelligenceCareers.com website
~~~ Focused on information-centric careers across all industries ~~~
Search Jobs / Hot Job Indexes / About